Upload
anthony-haynes
View
223
Download
3
Embed Size (px)
Citation preview
IntroductionIntroduction
• Cryptography is the enciphering and deciphering of messages in secret code.
• As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of
all developed countries.
Enigma MachineEnigma Machine
• Electrical pathways
• Custom Rotors
• Polyalphabetic substitution and One-time pads
• It’s breech was a momentous occasion in WWII
Importance of CryptographyImportance of Cryptography
• Almost all communications of sensitive data are done by software programs with file encryption capabilities.
• Without it, countries would fall.
• Used in digital signatures and credit card transactions over the internet.
Importance Continued…Importance Continued…
• Companies could not have online interfaces without it.
• Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.
ExampleExample
• Plaintext = hello
• Encoded = ifmmp
• Every letter is transformed into the letter preceding it.
CiphersCiphers
• The mathematical algorithm used to encrypt a message is called a cipher.
• Types: Symmetric Key Cipher & Asymmetric Key Cipher.
Modern CryptographyModern Cryptography
• Quantum Cryptography
• Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.
Modern Cryptography Cont..Modern Cryptography Cont..
• In old methods a couple photons could be intercepted and the users would not know.
• In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.
Parallel ProgrammingParallel Programming
• With parallel programming a hacker can use multiple key cracking algorithms.
• This makes it easier to crack keys that have lower encryption bits.
• With most of the
encryptions today,
a key can be broken in
O(2^n) time.
HackersHackers
• Even with a 56 bit encryption key, parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming
HackersHackers
• Even with a 56 bit encryption key parallel programming helps to crack the key.
• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.
1 Computer
Many computers with parallel programming